SATYA KOTIPALLI
****************@*****.*** +1-667-***-****
LinkedIn: https://www.linkedin.com/in/satya-kotipalli/ GitHub: https://github.com/SatyaKotipalli17?tab=repositories SUMMARY:
Experienced Security Engineer with 5+ years of expertise in network security, cloud security, and firewall management. Proficient in Palo Alto firewalls, AWS security solutions, Cisco Umbrella, and WAF deployment. Strong background in designing and implementing network security policies, API tracking, and security testing in both on-prem and cloud environments. Skilled in local networking, policy creation, and exception management, with hands-on experience in balancing OCI and ensuring secure, reliable network infrastructures. Passionate about delivering secure-by-design solutions and improving security posture across systems and applications.
• 5+ years of experience in network security, firewall management, and cloud security.
• Expertise in Palo Alto firewalls, AWS security configurations, and Cisco Umbrella for cloud network protection.
• Hands-on experience with WAF deployment and API tracking to ensure secure web traffic and application layer security.
• Proficient in network policy creation, exception handling, and security testing in on-prem and cloud environments.
• Experience with balancing OCI and optimizing network performance while maintaining robust security protocols.
• Strong understanding of local networking, rule creation, and managing network traffic in diverse infrastructures.
SKILLS
Network Security: Palo Alto Firewalls, Cisco Umbrella, WAF Deployment, API Tracking Cloud Security: AWS Security, OCI Balancing, Cloud Network Protection Network Configuration & Policies: Policy Creation, Rule Management, Exception Handling, Local Networking Security Testing & Compliance: Penetration Testing, Vulnerability Scanning, Firewall Rule Testing Infrastructure Management: On-Prem Networking, Cloud Networking, Performance Optimization Automation & Scripting: Python, Bash, Terraform, CloudFormation. PROFESSIONAL EXPERIENCE
Meta (via Qualitest Group) — Engineer – System Integrator Oct 2025 – Present
• Provide expert IT support across large-scale environments, ensuring secure configurations for interconnected systems, hardware, and servers.
• Perform vulnerability management, patching, and system diagnostics to maintain system integrity and high availability.
• Configure and troubleshoot network protocols, ensuring compliance with enterprise security standards.
• Collaborate with teams to manage incident response, identifying vulnerabilities and mitigating risks across Linux and Windows-based systems.
• Work with mobile device management systems, ensuring security compliance for corporate-issued mobile devices and laptops.
Graduate engineer may 2025 – Sep 2025
• Operated AR/VR hardware systems and biometric input devices for Meta’s wearable tech R&D and data collection, ensuring system reliability, data integrity, privacy compliance, and hardware–software interoperability in secured lab environments.
• Streamlined workflows with Python scripting and terminal automation to improve lab efficiency and reduce manual tasks in Linux-based setups delivered first-level support, hardware troubleshooting, and enforced IT asset handling and access control.
Echo spark Technologies LLC — Cyber Security Engineer
• Managed endpoint security for company-owned mobile devices, ensuring secure configuration, management, and compliance with company policies.
• Executed vulnerability assessments and patch management across enterprise systems, enhancing resilience by 30%.
• Led incident response efforts, working with teams to detect, analyze, and remediate security incidents.
• Provided user training on mobile device security, VPN connectivity, and endpoint hygiene.
• Developed and implemented security standards for mobile and endpoint security, ensuring alignment with company and regulatory policies.
Ernst & Young (EY) — Consulting Technology Trainee Feb 2022 – Jul 2022
• Conducted comprehensive security assessments, penetration testing, and vulnerability analysis for clients across multiple industries.
• Performed audits and risk assessments to evaluate vulnerabilities in enterprise systems and developed solutions to improve system security.
• Assisted clients in improving their security posture by recommending best practices for securing remote connectivity, mobile devices, and enterprise systems.
• Collaborated with teams to implement security measures and ensure compliance with regulations such as PCI-DSS and HIPAA.
My Captain — Cybersecurity Educator and Technical Support Dec 2019 – Jan 2022
• Coordinated and delivered cybersecurity training to 110 students, focusing on advanced computer networking, security best practices, and system administration.
• Conducted hands-on labs and tutorials, helping students understand mobile security, VPNs, anti-malware systems, and security protocols.
• Created training materials to educate users on security hygiene, secure mobile access, and best practices to safeguard enterprise assets.
PROJECTS
Branch Office Connectivity for Small Organization
• Designed WAN architecture connecting geographically distributed offices using enterprise routing concepts.
• Configured VLANs and routing policies to ensure network segmentation and optimized traffic flow.
• Implemented IPsec VPN tunnels to secure inter-site communications.
• Applied TCP/IP addressing schemes and DNS/DHCP services for scalable connectivity.
• Simulated switch and router configurations using Cisco Packet Tracer.
• Validated network performance, redundancy, and failover scenarios.
• Documented network topology, configuration standards, and operational procedures.
• Assessed security posture and recommended improvements for future modernization. Incident Handling Process Improvement
• Analyzed enterprise incident response workflows related to network and security events.
• Mapped detection and escalation paths aligned with SOC and network operations practices.
• Evaluated monitoring data to identify gaps in network visibility.
• Proposed automation strategies to improve response efficiency.
• Integrated lessons learned into preventive controls and documentation.
• Supported alignment with NIST-based incident response frameworks.
• Improved theoretical response timelines through process optimization.
• Strengthened coordination between security and network operations teams. Advanced Network and IoT Security
• Deployed secure network access controls using IoT-based access points.
• Configured captive portals and authentication mechanisms for controlled network access.
• Applied IDS/IPS concepts to detect and mitigate network-based threats.
• Tested network resilience against common attack vectors.
• Monitored traffic flows to identify anomalies and unauthorized access.
• Enhanced wireless network security and segmentation.
• Documented deployment architecture and security controls.
• Validated effectiveness through controlled testing scenarios. Hardware Based Cyber-Attack: USB Password Stealer
• Designed hardware-based testing tool to assess endpoint and network security posture.
• Analyzed data exfiltration paths and network detection limitations.
• Evaluated antivirus and endpoint monitoring effectiveness.
• Documented findings to improve enterprise defensive controls.
• Tested device behavior across multiple operating systems.
• Assessed implications for network access and endpoint trust models.
• Strengthened understanding of insider and peripheral-based threats.
• Produced technical documentation for security awareness and mitigation strategi EDUCATION
Master of Professional Studies in Cybersecurity
University of Maryland Baltimore County Aug 2022 – May 2024 CGPA: 3.7/4.0 Courses: Reverse Engineering, Law & Policy, Managing Cyber Operations, Enterprise Security, Risk Analysis & Compliance
CERTIFICATION:
• Certified Ethical Hacker (CEH)
• Certified in Cybersecurity (CC)
• Certified Cloud Practitioner (AWS)
• CompTIA Security+
• Penetration Testing-Hacking (Cybrary)
• Google Cloud Certified: Associate Cloud Engineer PUBLICATIONS:
• Pavan Kumar, Deepthi, S.A., Rao, E.S. (2022). RSA vs. ECC in WSN. Journal of VLSI Design Tools Technology.
• Pavan Kumar, K. Deepti. (2021). Hardware Cyber Threat Analysis. Engineering Journal 12(6), 315320.